Week 1: Why Privacy Matters

Why Privacy Matters “I have nothing to hide.” You’ve probably said this, or heard someone say it. It’s the most common response when privacy comes up. And it’s completely wrong. Privacy isn’t about hiding crimes. Privacy is about power—who has it, and who doesn’t. The Real Cost of “Nothing to Hide” When you say you have nothing to hide, you’re assuming: The rules will never change You’ll never be targeted unfairly No one will ever misuse your data Your information will never be stolen History proves all of these assumptions wrong. ...

December 30, 2025 · 5 min · Cypherpunk School

Week 2: Installing Linux

Installing Linux Windows and macOS are surveillance operating systems. That sounds dramatic, but it’s literally true. Both send telemetry data to Microsoft and Apple by default. Both have settings scattered across dozens of menus that reset after updates. Both prioritize their business interests over your privacy. Linux is different. On Linux, you decide what data leaves your computer. There’s no corporation harvesting your usage patterns, no ads in your start menu, no forced updates that reset your settings. ...

December 31, 2025 · 9 min · Cypherpunk School

Week 3: Browser Privacy

Browser Privacy Your browser is your window to the internet. It’s also the primary tool corporations use to track you. Every website you visit is watching: What pages you view and for how long What you click on and where your mouse moves Your screen size, fonts, and timezone Your browsing history through tracking cookies Your real IP address and approximate location This isn’t paranoia. This is how the modern web works. Websites embed tracking code from Google, Facebook, Amazon, and hundreds of data brokers. A single webpage can contact 50+ tracking domains before you see any content. ...

January 5, 2026 · 10 min · Cypherpunk School

Week 4: Password Managers

Password Managers If you reuse passwords, your security is an illusion. The reality: Billions of passwords leak every year. When smallforum.com gets hacked, attackers try those leaked passwords on Gmail, banks, and every major service. If you reused that password, your accounts are compromised. The average person has 100+ online accounts. You cannot remember 100 unique, strong passwords. You need a password manager. This week, you’ll set up a password manager—software that generates and stores unique passwords for every account. You’ll never reuse a password again. ...

January 5, 2026 · 10 min · Cypherpunk School

Week 5: Email Privacy

Email Privacy Gmail reads every email you send and receive. That’s not an exaggeration. Google scans your emails to: Build advertising profiles Train AI models on your conversations Track purchase history and receipts Identify your contacts and relationships Monitor your location through confirmation emails Google knows more about your life than your closest friends. They know when you’re job hunting (LinkedIn alerts), having health issues (doctor appointment confirmations), traveling (flight confirmations), and buying things (every receipt). ...

January 5, 2026 · 12 min · Cypherpunk School

Real-World Examples: Why Privacy Matters

Real-World Examples: Why Privacy Matters “I have nothing to hide” assumes the world is fair, rules never change, and your data will never be used against you. History—and current events—prove otherwise. This page documents real incidents where lack of privacy caused tangible harm. These aren’t hypotheticals. They happened to real people. Physical Security Threats Bitcoin and Cryptocurrency Holders When you publicly hold valuable assets, you become a target. The documented attacks are sobering: ...

January 6, 2026 · 8 min · Cypherpunk School